{"version":"1.0","provider_name":"AEWIN","provider_url":"https:\/\/www.aewin.com\/ko\/","author_name":"aewin","author_url":"https:\/\/www.aewin.com\/ko\/author\/aewin\/","title":"The New Age of OT Cyber Security - AEWIN","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"07PsKgRbIM\"><a href=\"https:\/\/www.aewin.com\/ko\/application\/ot-cyber-security\/\">The New Age of OT Cyber Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.aewin.com\/ko\/application\/ot-cyber-security\/embed\/#?secret=07PsKgRbIM\" width=\"600\" height=\"338\" title=\"&#8220;The New Age of OT Cyber Security&#8221; &#8212; AEWIN\" data-secret=\"07PsKgRbIM\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.aewin.com\/wp-content\/uploads\/2022\/03\/\u672a\u547d\u540d-1_\u5de5\u4f5c\u5340\u57df-1.jpg","thumbnail_width":2500,"thumbnail_height":1309,"description":"The importance of the cyber security OT incidents are more serious Not just losing the confidential information, OT cyber-attacks cause more destructive outcomes. The halts in production and operation may results in extensive financial losses, direct physical harm, and even potential casualties. Although the impact on OT is far more severe, the attention of OT [&hellip;]"}